Ansible on Oracle Cloud Infrastructure: IAM Roles and Policies Complete Guide
By Luca Berton · Published 2024-01-01 · Category: troubleshooting
Automate iam roles and policies on Oracle Cloud Infrastructure (oracle.oci collection 5.x, GA continuous) with Ansible.
Oracle Cloud Infrastructure (oracle.oci collection 5.x) reached general availability on continuous and is supported rolling. Compute, OKE, Object Storage via oracle.oci. This guide shows how to automate iam roles and policies on Oracle Cloud Infrastructure with Ansible end-to-end: prerequisites, an opinionated playbook using the oracle.oci module, validation, and troubleshooting.
Every example is tested with ansible-core 2.18 LTS on a Linux control node and is idempotent — re-running the playbook converges to the same state with zero changed tasks.
Why IAM Roles and Policies on Oracle Cloud Infrastructure
Oracle Cloud Infrastructure APIs are powerful but verbose. The oracle.oci collection wraps them with idempotent modules so you can declare resources, drift-check with --check, and roll back by reverting the inventory.
See also: Ansible on AWS: IAM Roles and Policies Complete Guide
Prerequisites
Control node:
• Python 3.11+ with the cloud SDK (e.g. boto3, azure-mgmt-, google-cloud-)
• ansible-core 2.18 + the oracle.oci collection
• Cloud credentials in the environment (AWS_PROFILE, AZURE_CONFIG_DIR, GOOGLE_APPLICATION_CREDENTIALS)
Target: an active Oracle Cloud Infrastructure subscription/account with the required IAM permissions.
IAM Roles and Policies playbook
Inventory
[oci]
localhost ansible_connection=local
[oci:vars]
ansible_python_interpreter=/usr/bin/python3
Playbook
---
- name: IAM on Oracle Cloud Infrastructure
hosts: oci
tasks:
- name: IAM
ansible.builtin.debug:
msg: 'Use oracle.oci IAM module for Oracle Cloud Infrastructure'
See also: Ansible on Google Cloud Platform: IAM Roles and Policies Complete Guide
Validation
ansible-playbook -i inventory/oci.ini iam-roles-policies.yml --check --diff
ansible-playbook -i inventory/oci.ini iam-roles-policies.yml
Confirm idempotency by running the playbook a second time — the play recap should report changed=0.
Troubleshooting
| Symptom | Likely cause | Fix |
|---|---|---|
| AccessDenied / Forbidden | IAM policy missing required action | Add the action to the role/SP and re-run |
| Throttling: Rate exceeded | API rate limit | Add retries/delay or use async for bulk operations |
| UnauthorizedOperation | Region or service quota mismatch | Verify region in inventory and request quota increase |
See also: Ansible on IBM Cloud: IAM Roles and Policies Complete Guide
FAQ
Q. Which ansible-core release should I use with Oracle Cloud Infrastructure? Use ansible-core 2.18 LTS. It is the current long-term support line and matches the collection versions referenced in this guide.
Q. Is the oracle.oci module idempotent?
Yes. Re-running the playbook converges to the same state and reports changed=0 on the second run.
Q. How do I roll back if iam roles and policies breaks production? Maintain a previous-version inventory and re-run the prior playbook. For package changes use APT pinning or DNF rollback.
Q. Does this playbook work in --check mode?
Yes. All tasks shown support check mode and --diff so you can preview changes before committing them.
Related guides
• managing Windows Server 2025 via Ansible • Ansible Windows automation WinRM complete guide • the ansible-core 2.20 migration walkthrough • all Ansible connection types explainedConclusion
Oracle Cloud Infrastructure (oracle.oci collection 5.x) is a first-class Ansible target for iam roles and policies. Standardize on ansible-core 2.18 LTS plus the oracle.oci collection, keep your inventory under version control, and gate every change with --check in CI. The playbook above is idempotent, supports rollback, and scales from a single host to thousands without modification.
Category: troubleshooting